Technology

Researchers Unearth Links Between SunCrypt and QNAPCrypt Ransomware

SunCrypt, a ransomware strain that went on to infect several targets last year, may be an updated version of the QNAPCrypt ransomware, which targeted Linux-based file storage systems, according to new research. “While the two ransomware [families] are operated by distinct different threat actors on the dark web, there are strong technical connections in code […]

Researchers Unearth Links Between SunCrypt and QNAPCrypt Ransomware Read More »

New ‘unc0ver’ Tool Can Jailbreak All iPhone Models Running iOS 11.0 – 14.3

A popular jailbreaking tool called “unc0ver” has been updated to support iOS 14.3 and earlier releases, thereby making it possible to unlock almost every single iPhone model using a vulnerability that Apple in January disclosed was actively exploited in the wild. The latest release, dubbed unc0ver v6.0.0, was released on Sunday, according to its lead developer Pwn20wnd,

New ‘unc0ver’ Tool Can Jailbreak All iPhone Models Running iOS 11.0 – 14.3 Read More »

Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites

A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware payloads. “The Gootkit malware family has been around more than half a decade – a mature Trojan with functionality centered around banking credential theft,” Sophos researchers Gabor Szappanos and Andrew Brandt said in a write-up published today. “In

Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites Read More »

Why do companies fail to stop breaches despite soaring IT security investment?

Let’s first take a look back at 2020! Adding to the list of difficulties that surfaced last year, 2020 was also grim for personal data protection, as it has marked a new record number of leaked credentials and PI data. A whopping 20 billion records were stolen in a single year, increasing 66% from 12

Why do companies fail to stop breaches despite soaring IT security investment? Read More »

Chinese Hackers Targeted India’s Power Grid Amid Geopolitical Tensions

Amid heightened border tensions between India and China, cybersecurity researchers have revealed a concerted campaign against India’s critical infrastructure, including the nation’s power grid, from Chinese state-sponsored groups. The attacks, which coincided with the standoff between the two nations in May 2020, targeted a total of 12 organizations, 10 of which are in the power generation and

Chinese Hackers Targeted India’s Power Grid Amid Geopolitical Tensions Read More »

SolarWinds Blames Intern for ‘solarwinds123’ Password Lapse

As cybersecurity researchers continue to piece together the sprawling SolarWinds supply chain attack, top executives of the Texas-based software services firm blamed an intern for a critical password lapse that went unnoticed for several years.  The said password “solarwinds123” was originally believed to have been publicly accessible via a GitHub repository since June 17, 2018, before

SolarWinds Blames Intern for ‘solarwinds123’ Password Lapse Read More »

ALERT: Malicious Amazon Alexa Skills Can Easily Bypass Vetting Process

Researchers have uncovered gaps in Amazon’s skill vetting process for the Alexa voice assistant ecosystem that could allow a malicious actor to publish a deceptive skill under any arbitrary developer name and even make backend code changes after approval to trick users into giving up sensitive information. The findings were presented on Wednesday at the

ALERT: Malicious Amazon Alexa Skills Can Easily Bypass Vetting Process Read More »

North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware

A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry. Attributing the attacks with high confidence to the Lazarus Group, the new findings from Kaspersky signal an expansion of the APT actor’s tactics by going beyond the usual gamut

North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware Read More »

Cisco Releases Security Patches for Critical Flaws Affecting its Products

Cisco has addressed a maximum severity vulnerability in its Application Centric Infrastructure (ACI) Multi-Site Orchestrator (MSO) that could allow an unauthenticated, remote attacker to bypass authentication on vulnerable devices. “An attacker could exploit this vulnerability by sending a crafted request to the affected API,” the company said in an advisory published yesterday. “A successful

Cisco Releases Security Patches for Critical Flaws Affecting its Products Read More »

Chinese Hackers Using Firefox Extension to Spy On Tibetan Organizations

Cybersecurity researchers today unwrapped a new campaign aimed at spying on vulnerable Tibetan communities globally by deploying a malicious Firefox extension on target systems. “Threat actors aligned with the Chinese Communist Party’s state interests delivered a customized malicious Mozilla Firefox browser extension that facilitated access and control of users’ Gmail accounts,” Proofpoint said

Chinese Hackers Using Firefox Extension to Spy On Tibetan Organizations Read More »